[Webinar] Learn how to a build a cloud-first strategyRegister Now


Restrict Outside Network Access

Posted on 2009-04-29
Medium Priority
Last Modified: 2012-05-06
I am starting to get contractors in our facility after hours that are pluggin laptops into open jacks on our shop floor in order to do xyz functions. What I would like to do (if possible) is collect all of the mac address that I know are valid and create some sort of list or table to authenticate against. That way if someone from the outside try to plug in they will get denied.

I am running a windows 2003 server. If this can be done can someone provide a step by step instruction.
Question by:djp12345
  • 2

Expert Comment

by:Carlos Diaz
ID: 24269118
If you are running a Cisco  switch, I'd advise sticky mac addresses, and shutting down the unused ports.

Author Comment

ID: 24269364
I can't shut down the unused ports. There are times for example one of our maintenace guys would have to plug into one to look at a machine or something (until I install wireless this is not an option).

Accepted Solution

Carlos Diaz earned 200 total points
ID: 24269458
Are you using a Cisco switch?  Another option would be a mac-address access list.  Is your network running DHCP?  If it's static, you could apply a standard ip access-list at the router allowing only the current machines, plus one more ip address for the maintenance guy(s).

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Learn about cloud computing and its benefits for small business owners.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

868 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question